Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Dump completed successfully, progress percentage: 100 ************* Path validation summary ************** Response Time (ms) Location Deferred srv*C:\symbols*https://msdl.microsoft.com/download/symbols Symbol search path is: srv*C:\symbols*https://msdl.microsoft.com/download/symbols Executable search path is: Windows 10 Kernel Version 22000 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 22000.1.amd64fre.co_release.210604-1628 Machine Name: Kernel base = 0xfffff805`66c00000 PsLoadedModuleList = 0xfffff805`67829b90 Debug session time: Wed Feb 23 08:53:23.884 2022 (UTC + 1:00) System Uptime: 0 days 8:41:53.486 Loading Kernel Symbols ............................................................... .......Page 11e8ad not present in the dump file. Type ".hh dbgerr004" for details ......................................................... .........................................Page 842c20 not present in the dump file. Type ".hh dbgerr004" for details ..Page 8428fe not present in the dump file. Type ".hh dbgerr004" for details ...Page 84f6aa not present in the dump file. Type ".hh dbgerr004" for details .................. ........... Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`003cf018). Type ".hh dbgerr001" for details Loading unloaded module list ................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff805`670164c0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff285`3056f390=000000000000000a 14: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000020, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 000000000000006e, value 0 = read operation, 1 = write operation Arg4: fffff805c510581e, address which referenced memory Debugging Details: ------------------ Page 842d82 not present in the dump file. Type ".hh dbgerr004" for details KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1343 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 3657 Key : Analysis.Init.CPU.mSec Value: 499 Key : Analysis.Init.Elapsed.mSec Value: 30800 Key : Analysis.Memory.CommitPeak.Mb Value: 94 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: MEMORY.DMP DUMP_FILE_ATTRIBUTES: 0x1000 BUGCHECK_CODE: d1 BUGCHECK_P1: 20 BUGCHECK_P2: ff BUGCHECK_P3: 6e BUGCHECK_P4: fffff805c510581e READ_ADDRESS: 0000000000000020 ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: matrix.exe TRAP_FRAME: fffff2853056f4d0 -- (.trap 0xfffff2853056f4d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000005300c2 rbx=0000000000000000 rcx=0000000000000186 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff805c510581e rsp=fffff2853056f668 rbp=0000000000000012 r8=fffff780000003d8 r9=0000000000000000 r10=000000000010000b r11=ffffb581887c20b0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl zr na po nc vtss+0x1581e: fffff805`c510581e c3 ret Resetting default scope STACK_TEXT: fffff285`3056f388 fffff805`670290a9 : 00000000`0000000a 00000000`00000020 00000000`000000ff 00000000`0000006e : nt!KeBugCheckEx fffff285`3056f390 fffff805`67025200 : 00000000`00000001 00000001`00000000 00000000`80000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff285`3056f4d0 fffff805`c510581e : fffff805`c51046f1 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x440 fffff285`3056f668 fffff805`c51046f1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : vtss+0x1581e fffff285`3056f670 fffff805`c50fb649 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : vtss+0x146f1 fffff285`3056f6a0 fffff805`c50fdbde : ffffc700`3169d8f0 fffff285`3056f940 ffffc700`2f47c710 fffff285`3056f799 : vtss+0xb649 fffff285`3056f6d0 fffff805`c50f560d : 00000000`0000c72e 00000000`00000031 00000000`00000015 ffffc700`00000032 : vtss+0xdbde fffff285`3056f740 fffff805`c50f539f : 00000000`000218a5 fffff285`3056f829 00000000`00000000 fffff285`3056fa50 : vtss+0x560d fffff285`3056f770 fffff805`c51037d2 : ffffc700`1e4a6080 00000000`00000000 ffffc700`1f6e5740 00000000`00000000 : vtss+0x539f fffff285`3056f7a0 fffff805`66f1cf94 : ffffc700`1f6e50c0 00000000`00000000 00000000`00000001 ffffb300`00000000 : vtss+0x137d2 fffff285`3056f7d0 fffff805`6701b238 : 00000000`00000000 00000000`00000000 ffffffff`ffffffd2 fffff805`00000000 : nt!KiDeliverApc+0x314 fffff285`3056f890 fffff805`670250c6 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc700`00000000 : nt!KiApcInterrupt+0x328 fffff285`3056fa20 00000001`400018d1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x306 00000000`08abfeb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`400018d1 SYMBOL_NAME: vtss+1581e MODULE_NAME: vtss IMAGE_NAME: vtss.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 1581e FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_vtss!unknown_function OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f9d1c03b-7d39-2ae8-0af5-2234a488a29f} Followup: MachineOwner ---------